Category Archives: Security Tools

Wanna Ransomware

How To Stay Protected Against Ransomware   Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to… Read More »

QualTech Critical Infrastructure Services

QualTech360Care Endpoint Security with Sophos When it comes to cloud managed services QualTech goes beyond just making available virtual infrastructure such as single tenant isolated virtual networks and vms running Linux or Windows 2012 OS. Our multiple data center redundant cloud infrastructure hosted in ISO 27000 certified data centers gives you scalable and compliant infrastructure you can trust but… Read More »

HoneyDrive Desktop v0.2 Released – Honeypot LiveCD

Source: darknet.org “HoneyDrive is a virtual appliance (OVA) with Xubuntu Desktop 12.04 32-bit edition installed. It contains various honeypot software packages such as Kippo SSH honeypot, Dionaea malware honeypot, Honeyd low-interaction honeypot, Glastopf web honeypot along with Wordpot, Thug honeyclient and more. Additionally it includes useful pre-configured scripts and utilities to analyze, visualize and process the data it… Read More »

Microsoft Attack Surface Analyzer Catalogs Threats

Source: Information Week by  Mathew J. Schwartz In this article “What’s the information security threat posed by any given piece of software that’s installed on a Windows machine? To help businesses answer that question, Microsoft last week released its free Attack Surface Analyzer 1.0 tool. “The purpose of this tool is to help software developers, independent software vendors (ISVs), and… Read More »

Advanced Password Recovery Tool (Hash Cat)

Hash Cat Features Multi-Threaded Free Multi-Hash (up to 24 million hashes) Multi-OS (Linux & Windows native binaries) Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, …) SSE2 accelerated All Attack-Modes except Brute-Force and Permutation can be extended by rules Very fast Rule-engine Rules compatible with JTR and PasswordsPro Possible to resume or limit session Automatically recognizes recovered hashes from outfile at startup Can automatically generate random rules Load saltlist from external file and then use them in… Read More »